A ____ is someone who considers it working for the common good to hack into networks in order to call attention to flaws in security so that they can be fixed.
A. black-hat hacker
B. white-hat hacker
C. gray-hat hacker
D. script kiddie
Answer: B
You might also like to view...
Which of the following is not an example of a potentially unwanted program (PUP)?
A. adware B. browser parasite C. drive-by download D. spyware
Under the UCC, implied warranties on goods include:
a. warranty of price, warranty of commercial practicability and warranty of origin. b. warranty of title, warranty of merchantability and warranty of fitness for a particular purpose. c. warranty of price, warranty of quantity and warranty of title. d. warranty of title, warranty of price and warranty of origin.
Data mining techniques are essential for database marketing
Indicate whether the statement is true or false
A person with a pattern of ____ has developed a sense of self-worth and a healthy attitude of self-reliance
a. counterdependence c. independence b. overdependence d. interdependence